Results 91 to 100 of about 13,174 (191)

Proton nanomodulators for enhanced Mn2+-mediated chemodynamic therapy of tumors via HCO3 − regulation

open access: yesJournal of Nanobiotechnology
Background Mn2+-mediated chemodynamic therapy (CDT) has been emerged as a promising cancer therapeutic modality that relies heavily on HCO3 − level in the system.
Peng Yang   +10 more
doaj   +1 more source

HIDING BEHIND THE CLOUDS: EFFICIENT, PRIVACY-PRESERVING QUERIES VIA CLOUD PROXIES [PDF]

open access: yes, 2014
This project proposes PriView, a privacy-preserving technique for querying third-party ser- vices from mobile devices. Classical private information retrieval (PIR) schemes are diffi- cult to deploy and use, since they require the target service to be ...
Gaur, Surabhi
core   +1 more source

A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

open access: yes, 2016
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security.
Hanzo, Lajos   +3 more
core   +1 more source

EECDH to prevent MITM attack in cloud computing

open access: yesDigital Communications and Networks, 2019
Cloud computing has reached the peak of Gartner hype cycle, and now the focus of the whole telecom industry is the ability to scale data storage with minimal investment. But data privacy and communication issues will occur with the increment of the cloud data storage.
Shajina Anand, Varalakshmi Perumal
openaire   +2 more sources

SMFA: Strengthening Multi-Factor Authentication With Steganography for Enhanced Security

open access: yesIEEE Access
Traditional password-based authentication mechanisms exhibit significant security vulnerabilities, prompting the adoption of Multi-Factor Authentication (MFA) to enhance user verification.
Afjal H. Sarower   +4 more
doaj   +1 more source

JXTA security in basic peer operations [PDF]

open access: yes, 2008
Open Access ...
Arnedo Moreno, Joan   +1 more
core  

Intrusion detection in IoT networks using machine learning and deep learning approaches for MitM attack mitigation

open access: yesDiscover Internet of Things
The Internet of Things (IoT) revolutionizes connectivity but introduces significant security challenges, particularly concerning man-in-the-middle (MitM) attacks.
Muhanna Ahmed Ali   +1 more
doaj   +1 more source

VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity

open access: yesInformation, 2014
Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic.
Won Min Kang   +2 more
doaj   +1 more source

Stealth-MITM DoS Attacks on Secure Channels

open access: yes, 2009
We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack
Herzberg, Amir, Shulman, Haya
openaire   +2 more sources

Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids

open access: yesIEEE Access
The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP),
Kalinath Katuri   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy